1
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

2
by Bellovin, Steven M.
Published 2016
Addison-Wesley
Subjects: ...Computer security...

3
Published 2018
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

4
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...

5
by Stackpole, Bill
Published 2010
Auerbach
Subjects: ...Computer security / Management...

6
by Peterson, Andrew
Published 2016
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

7
by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
Published 2017
Packt Publishing
Table of Contents: ...Security Information and Event Management (SIEM) -- Splunk -- Alert status -- IDS versus IPS...

8
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

9
by Winkler, Ira
Published 2022
John Wiley
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

10
by Carpenter, Perry, Roer, Kai
Published 2022
John Wiley & Sons, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

11
by Winkler, Ira
Published 2022
Tantor Media, Inc.
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

12
by Carpenter, Perry, Roer, Kai
Published 2022
Ascent Audio
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

13
by Carpenter, Perry
Published 2019
Wiley
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

14
by Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents: ... the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...

15
by Clarke, Justin
Published 2005
Safari Tech Books Online
Subjects: ...Computer security...

16
by Brotby, W. Krag
Published 2013
CRC Press
Table of Contents: ... -- Introduction; Chapter 2 -- Why Measure Information Security?; Chapter 3 -- The Art and Science of Security...

17
by Tibble, Ian
Published 2011
Auerbach
Subjects: ...Computer security...

18
by Vellani, Karim H.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory...

19
by Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents: ...The Fighting Stance: Security Awareness -- Developing a Security Focus: Identifying Critical Assets...

20
by Sheward, Mike
Published 2020
BCS, The Chartered Institute for IT
Subjects: ...Computer security / thema...